manoelt / 50M_CTF_WriteupLinks
$50 Million CTF from Hackerone - Writeup
☆595Updated 6 years ago
Alternatives and similar repositories for 50M_CTF_Writeup
Users that are interested in 50M_CTF_Writeup are comparing it to the libraries listed below
Sorting:
- An intentionally designed broken web application based on REST API.☆575Updated 4 years ago
- TotalRecon installs all the recon tools you need☆464Updated 5 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆654Updated 3 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆745Updated 3 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Updated 5 years ago
- The Web Application Hacker's Handbook - Extra Content☆551Updated 2 years ago
- CTFs, solutions and presentations☆290Updated 3 months ago
- Interview questions to screen offensive (red team/pentest) candidates☆883Updated 6 years ago
- A collection of useful Serverless functions I use when pentesting☆388Updated 2 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 3 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆633Updated 6 years ago
- DNS covert channel implant for Red Teams.☆732Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,006Updated 6 years ago
- Notes of my OSCP study plan☆463Updated 3 years ago
- GTRS - Google Translator Reverse Shell☆616Updated 9 months ago
- Multi Tool Subdomain Enumeration☆725Updated 4 years ago
- DNS Rebinding Exploitation Framework☆491Updated 4 years ago
- Red Team Tactics, Techniques, and Procedures☆407Updated last month
- List of awesome penetration testing resources, tools and other shiny things☆343Updated 7 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆564Updated 2 years ago
- secretz, minimizing the large attack surface of Travis CI☆327Updated 3 years ago
- Some security related notes☆460Updated 7 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆356Updated 5 months ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Updated 5 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆633Updated 7 years ago
- Ephemera and other documentation associated with the 1337list project.☆395Updated 7 years ago
- Repository for hosting my research papers☆512Updated last year
- Tests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline.☆619Updated 3 years ago